Filtrer vos résultats
- 130
- 18
- 1
- 99
- 30
- 5
- 5
- 4
- 3
- 2
- 1
- 1
- 118
- 111
- 9
- 2
- 1
- 22
- 4
- 12
- 14
- 9
- 16
- 7
- 3
- 2
- 6
- 1
- 4
- 5
- 5
- 5
- 4
- 9
- 4
- 8
- 8
- 7
- 3
- 3
- 3
- 3
- 1
- 1
- 2
- 121
- 24
- 4
- 73
- 29
- 28
- 23
- 15
- 14
- 14
- 10
- 9
- 8
- 7
- 5
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 149
- 19
- 19
- 17
- 16
- 14
- 12
- 10
- 9
- 8
- 8
- 8
- 8
- 8
- 7
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
149 résultats
|
Stéganographie naturelle pour images JPEGGRETSI, Aug 2019, Lille, France
Communication dans un congrès
hal-02165880v1
|
||
|
Document Authentication Using Graphical Codes: Reliable Performance Analysis and Channel OptimizationEURASIP Journal on Information Security, 2014, pp.10.1186/1687-417X-2014-9. ⟨10.1186/1687-417X-2014-9⟩
Article dans une revue
hal-01056699v1
|
||
|
IMAGE MODEL AND PRINTED DOCUMENT AUTHENTICATION: A THEORETICAL ANALYSISIEEE International Conference on Image Processing, Oct 2014, France. pp.IEEE ICIP
Communication dans un congrès
hal-01056706v1
|
||
|
A New Measure of Watermarking Security: The Effective Key LengthIEEE Transactions on Information Forensics and Security, 2013, 8 (8), pp.1306 - 1317
Article dans une revue
hal-00836404v1
|
||
|
Are 128 Bits Long Keys Possible in Watermarking?13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.191-191, ⟨10.1007/978-3-642-32805-3_15⟩
Communication dans un congrès
hal-01540890v1
|
||
TROP-ELM: A double-regularized ELM using LARS and Tikhonov regularizationNeurocomputing, 2011, 74 (16), pp.2413-2421. ⟨10.1016/j.neucom.2010.12.042⟩
Article dans une revue
istex
hal-00648069v1
|
|||
|
Fooling an Automatic Image Quality EstimatorMediaEval 2020 - MediaEval Benchmarking Intiative for Multimedia Evaluation, Dec 2020, Online, United States. pp.1-4
Communication dans un congrès
hal-03132891v1
|
||
|
Actes de la conférence CAID 20202021
Proceedings/Recueil des communications
hal-03206297v1
|
||
A quantization Watermarking technique robust to linear and non-linear valumetric distortions using a fractal set of floating quantizersInformation Hiding Workshop, 2005, Barcelonna, Spain
Communication dans un congrès
hal-00079344v1
|
|||
|
Self-similarity based image watermarkingEUSIPCO, Oct 1998, Rhodos, Greece. pp.2277-2280
Communication dans un congrès
hal-00166545v1
|
||
Color Image Watermarking Using Quaternion Fourier TransformICASSP, Sep 2003, Hong Kong SAR China. pp.CD-rom
Communication dans un congrès
hal-00166554v1
|
|||
|
Practical Key Length of Watermarking SystemsICASSP 2012 - IEEE International Conference on Acoustics, Speech and Signal Processing, Mar 2012, Kyoto, Japan
Communication dans un congrès
hal-00686813v1
|
||
Steganalysis: Detection of Hidden Data in Multimedia ContentMultimedia Security 1: Authentication and Data Hiding, 1, Wiley, Chapter 8, 2022, Online ISBN: 9781119901808 Print ISBN: 9781789450262. ⟨10.1002/9781119901808.ch8⟩
Chapitre d'ouvrage
lirmm-03815641v1
|
|||
|
Moving Steganography and Steganalysis from the Laboratory into the Real WorldACM IH-MMSEC 2013, Jun 2013, Montpellier, France. pp.ACM 978-1-4503-2081-8/13/06
Communication dans un congrès
hal-00836407v1
|
||
|
Natural Steganography in JPEG Domain With a Linear Development PipelineIEEE Transactions on Information Forensics and Security, 2020, 16, pp.173-186. ⟨10.1109/TIFS.2020.3007354⟩
Article dans une revue
hal-02910206v1
|
||
|
Using High-Dimensional Image Models to Perform Highly Undetectable SteganographyInformation Hiding, Jun 2010, Calgary, Canada. pp.2010
Communication dans un congrès
hal-00541353v1
|
||
|
Side-Informed Steganography for JPEG Images by Modeling Decompressed ImagesIEEE Transactions on Information Forensics and Security, In press, ⟨10.1109/TIFS.2023.3268884⟩
Article dans une revue
hal-04083163v1
|
||
|
PHYSICAL OBJECT AUTHENTICATION: DETECTION-THEORETIC COMPARISON OF NATURAL AND ARTIFICIAL RANDOMNESSICASSP, Mar 2016, Shanghai, China
Communication dans un congrès
hal-01283068v1
|
||
|
Fighting the Reverse JPEG Compatibility Attack: Pick your SideThe 10th ACM Workshop on Information Hiding and Multimedia Security, Jun 2022, Santa Barbara, United States. ⟨10.1145/3531536.3532955⟩
Communication dans un congrès
hal-03662307v1
|
||
|
Soft-SCS: improving the security and robustness of the Scalar-Costa-Scheme by optimal distribution matchingINFORMATION HIDING, May 2011, Czech Republic. pp.208-222, ⟨10.1007/978-3-642-24178-9_15⟩
Communication dans un congrès
hal-00648055v1
|
||
|
Reliable Steganalysis Using a Minimum Set of Samples and FeaturesEURASIP Journal on Information Security, 2009, 2009, pp.ID 901381. ⟨10.1155/2009/901381⟩
Article dans une revue
hal-00437868v1
|
||
|
Two Key Estimation Techniques for the Broken-Arrows Watermarking SchemeACM Multimedia and Security Workshop 2009, Sep 2009, Princeton NJ, United States. pp.1-8
Communication dans un congrès
hal-00384058v1
|
||
|
Broken ArrowsEURASIP Journal on Information Security, 2008, 2008, pp.ID 597040. ⟨10.1155/2008/597040⟩
Article dans une revue
hal-00335311v1
|
||
Natural Watermarking: a secure spread spectrum technique for WOA2007, pp.8
Autre publication scientifique
hal-00157965v1
|
|||
Achieving subspace or key security for WOA using natural or circular watermarkingProceeding of the 8th workshop on Multimedia and security, 2006, pp.80-88
Autre publication scientifique
hal-00157995v1
|
|||
|
Vulnerability of DM watermarking of non-iid host signals to attacks utilising the statistics of independent componentsIEE Proceedings - Information Security, 2006, 153 (3), pp.127-13
Article dans une revue
hal-00166596v1
|
||
|
Security and Robustness Constraints for Spread-Spectrum Tardos FingerprintingWIFS 2010 - IEEE international Workshop on Information Forensics and Security (WIFS'10), Dec 2010, Seattle, United States. pp.2010
Communication dans un congrès
hal-00541383v1
|
||
|
Une methodologie pour la selection de variables pour la steganalyseTraitement du Signal, 2009, 26 (1), pp.13-30
Article dans une revue
hal-00437891v1
|
||
|
Optimization of Natural Watermarking Using Transportation TheoryACM Multimedia and Security Workshop 2009, Sep 2009, Princeton NJ, United States. pp.1-8
Communication dans un congrès
hal-00437902v1
|
||
|
Optimal Transport for Secure Spread-Spectrum Watermarking of Still ImagesIEEE Transactions on Image Processing, 2014, 23 (4), pp.1694-1705. ⟨10.1109/TIP.2014.2305873⟩
Article dans une revue
hal-00940754v2
|